You are on page 1of 76

To Protect And Infect

The Militarization of the Internet


(Part Two; in three acts)
The 30c3 December 30
th
, 0!3
"acob A##elba$m (%ioerror)

Act I

(&ow end) cor#orate s#'in(

)ommercial hardware sol$tions are rather borin(

*orensics hardware li+e the ,Mo$se "i((ler,

-ow disabled in s'stemd (.)

Power insertion attac+s

/ot#l$( seiz$res

0e'stro+e recorders

lar(el' lame

*in*isher, /ac+in(Team, 12P3-


4afael is a 5o$rnalist
from An(ola, who
e6#osed corr$#tion
in the (o7ernment8
An(ola Attac+

Disco7ered at 9slo *reedom *or$m

&amest 9: ; bac+door e7er


:creenca#t$re
)$rl
:lee#

2ns$s#ectin( < => of screenshots in the home director'

Infrastr$ct$re connected with 9#eration /an(o7er


A##in :ec$rit'

)ode si(ned
A##le re7o+ed the si(nin( #ermissions in a reasonable time frame
In :$mmer 0!3 4afael was arrested, then
released and faced !! criminal char(es for his
wor+ e6#osin( corr$#tion8
The' do harm to (ood #eo#le and the' hand
wa7e awa' their contrib$tion to increasin( the
total amo$nt of h$man s$fferin( in the world8
These ($'s aren?t im#ressi7e

Act II
Meta@#ointA ,non@attrib$table to -:A,
Meta@#ointA Total s$r7eillance B control in secrecy
Intelli(ence a(enc' ,sol$tions,
The >i( Pict$re

Planetar' :trate(ic :$r7eillance and888

36#loitation :'stems

Passi7e sensors

)ollect (T24M9I&)

Acti7e attac+s

Infect (T24>I-3, C*I43, etc)

Dait, what abo$t ,ProtectE.,

M$lti@#wn.

>lac+hats $sed to +ee# 'o$r bo6 $#dated

888 these ($'s ste# on each other?s toes

9#erations F)lose Access 9#erationsF and F9ff@-etG


/ow do ,the', do itE

Dra(net s$r7eillance

Data retention

H!I 'ears at least, incl$din( content.

Tas+in(, e6#loitation

C2A-T2M T/394J and how each ,sol$tion,


tries to meet this (oal

Man@9n@The@:ide as C2A-T2M I-:34TI9-

P4I:M, F$#streamG and man' other #ro(rams


FThe'?ll ne7er find me.G
Dream on Data 4etention is an im#ortant #art of
total s$r7eillance and the anal'sis is s$ccessf$l
a(ainst $s all8
Data totalitarianism or #$t another wa'A
totalitarianism
T24M9I&
Dee# Pac+et Ins#ection
(Passi7e dra(net s$r7eillance sensors)
T24>I-3
Dee# Pac+et In5ection
C*I43
T24M9I& and T24>I-3 combined with
additional infrastr$ct$re that the' co@o#t thro$(h
#wna(e of ro$ters and other o#erations8
MA4I-A
*rom wireta##in( to whole life s$r7eillance
36am#le oneA =erman )hancellor Merkel!
(De re7ealed this o#eration in Der :#ie(el)
36am#le twoA Political and reli(io$s ?$ntas+ed?
tar(etin( for some set of websites
36am#le threeA three ho#s awa'E 2h oh.
(That's you!)
This is the militarization of the internet

De are $nder a +ind of martial law

This strate(' is $nderminin( the internet in a


direct attem#t to +ee# it insec$re

De are #ersonall' and sociall' left 7$lnerable


and acti7el' e6#loited, literall'

This is bein( done in o$r names with o$r ta6


mone' and witho$t o$r consent; $s$all' witho$t
the +nowled(e of o$r re#resentati7es.

Those who +now $s$all' do not act$all'


$nderstand. (e(A Members of the 2: )on(ress)
Acti7e e6#loitation of tar(ets with *9;A)ID
:elector s$r7eillance leads to e6#loitationA

C2A-T2MT/394J

:3A:9-3DM9T/ (:M9T/)

C2A-T2M-ATI9-

1A&IDAT94, )9MM9-D334

C2A-T2M>9T

C2A-T2M)9PP34

Thin+ FThe =reat *irewall of )hinaG

Ahem, FThe =reat *irewall of 3arthG

C2A-T2MI-:34T

Thin+ Man@on@the@side
TA9 infrastr$ct$re

*irst the' find the tar(et, then the' redirect them

C2A-T2MI-:34T and *9;A)ID

:er7er?s li+e to #retend that the'?re A#ache


ser7ers

Im#lemented in P'thon, easil' fin(er#rinted

A few *9;A)ID 24&s are #$blic

Pa' attention to the b$(s in their


im#lementation
Dhen the -:A can?t do it the' brin( in =)/C.
And bo' oh bo' do the' lo7e Jahoo.

4e@#$r#osin( hardware and im#ersonatin(
infrastr$ct$re
4e@#$r#osin( $n$sed Di*i hardware
)ell base stations
(software) FIm#lantsG

1A&IDAT94, )9MM9-D334, 9&JMP2:,


2-IT3D 4A03, :T2;-3T and man' man'
more

Dith #a'loads for 'o$888

K>AD>I9:

:MM

iPhone

4o$ters ("$ni#er, /$awei, )isco, etc)

:IM cards (remote, local)

/ard dri7e firmware


&oo+in( for -:A malwareE
&oo+ for sam#les that im#lement 4)L and that
emit encr'#ted 2DP traffic8
i9:
The -:A claims in their C2A-T2MT/394J
doc$ments that e7er' attem#t to im#lant i9: will
always succeed8
WTFE
Interdiction
:o@called Foff@net? o#erations incl$de tam#erin(
with 'o$r hardware while it is bein( shi##ed.
The' call this #rocess FInterdictionG
4ememberA Don?t for(et to chec+ your (ear.
/ardware im#lants

/ardware interdiction is $sed to attac+A

P)I@>2:

ic b$s

"TA= (with #ersistence)

Modification of cell#hone hardware

Modified 2:> cable and 2:> #orts

Modified networ+ cards

&ots of interestin( c$stom hardware


:abota(e of 2: com#anies
Do 'o$ notice the common theme of sabota(in(
com#aniesE
2: President 9bama?s own ad7isors recentl'
iss$ed a re#ort ad7isin( a(ainst this strate('8
)9TT9-M92T/@II is chea# too.
888$nless 'o$ co$nt the cost to o$r libert'.
Dhew, it?s all st$ff we tho$(ht888
/a, 5$st +iddin(.
:#ecialized Phili# 08 Dic+ ins#ired ni(htmares

)ontin$o$s Da7e (enerators

888beamin( into #eo#le

/$h, no data on h$man safet' for these toolsE

Dhat ha##ened to /$(o e6actl'E A@)

4oom b$(s

Data e6filtration 7ia acti7e radar

1ideo e6filtration 7ia added hardware with radar

0e'board retro@reflector data e6filtration

&ocation trac+in( of tar(ets (+ill ?em wMdrones)



/a##' -ew Jear.
Than+s for 'o$r material s$##ort.

And' MNller@Ma($hn

3ric /older ("r)

3m#eror Ale6ander

"$lian Assan(e

&a$ra Poitras

Marcel, "$dith, )hristian, /ol(er, "or( and others Der :#ie(el

2: President 9bama

The bra7e #eo#le who came forward to tell $s their stories

3s#eciall' o$r anon'mo$s s$##orters, than+ 'o$.


De enco$ra(e 'o$ to 7isit Der :#ie(el 9nline for o$r
e6tensi7e co7era(e in 3n(lish and =erman.
Than+ 'o$.
C$estionsE
Resistance isn't futile, it's the new mode of participation.
Act IIIE @ It?s $# to 'o$.
&ea+ more doc$ments.

You might also like